99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

代寫SCC.363、代做Java,c++設(shè)計程序

時間:2024-02-11  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



202**024 ASSESSMENTS
Undergraduate
Individual Programming
Assessment Weighting [30%]
SCC.363 Security and Risk
Academic Honesty and Integrity
Students at Lancaster University are part of an academic community that values trust,
fairness and respect and actively encourages students to act with honesty and integrity. It is
a University policy that students take responsibility for their work and comply with the
university’s standards and requirements- found in the Manual of Academic Regulations and
Practice. By submitting their answers students will be confirming that the work submitted is
completely their own. By submitting their answers the group of students will be confirming
that the work submitted is that of the group. Academic misconduct regulations are in place
for all forms of assessment and students may familiarise themselves with this via the
university website:
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
Plagiarism
Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
were one’s own. This covers every form of submitted work, from written essays, video
vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
cheating and is regarded as a serious breach of the core values of the University. More
information may be found via the plagiarism framework website. All coursework is to be
submitted electronically and will be run through our plagiarism detection mechanisms.
Please ensure you are familiar with the University's Plagiarism rules and if you are in any
doubt please contact your module tutor.
https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
General Guidance:
This is an individual assessment that will count for 30% of your overall mark for this module.
Learning objectives
• Develop appreciation and understanding of security concepts.
• Formulate troubleshooting methods to identify/solve problems.
• Evaluate information to argue solution choices critically.
• Effectively communicate ideas.
Submission requirements
Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
use Python3. You can use modules from standard Python3 and cryptography.io. Your code
should include appropriate comments explaining what you do and why. All implementations
must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
Your code should include appropriate comments explaining your solution.
Example of the type of comments you SHOULD AVOID -- the comments don't explain the
solution:
def avalancheCalculator(string1, string2):
 # I hash the strings and generate the hexdigest values
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 # I convert the hexdigest to integers
 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 # I XOR the integers
 intResult = int1 ^ int2

 # I return the 1's in the binary representation.
 return ( bin(intResult).count('1') )
Examples of types of comments that provide adequate information – the comments explain
the solution to the problem:
def avalancheCalculator(string1, string2):
 # A solution to the problem is to xor the integer representation
 # of the two values and count in the resulting int the number of bits
 # having the value of 1.
 hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
 hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

 int1 = int(hexstring1, 16)
 int2 = int(hexstring2, 16)
 intResult = int1 ^ int2

 # The "1"s in the binary representation of the XOR operation
 # represent which bits from int1 and int2 are different.
 # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
 # Counting the "1"s will provide how many bits differ
 return ( bin(intResult).count('1') )
You have to upload the implementation of your functions on CodeRunner.
Marking Guidelines:
• You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
solution, comments in the code, and correctness. More information is provided within the
individual questions.
• The name of functions, type/number of variables, and return values must follow the tasks’
guidelines. Failing to adhere to this may result in not receiving marks.
Deadline for submissions: Friday 16
th February 16:00
TASK 1
--------
You are provided with the ds_hash hash function. The function receives a
finite message as input and produces a non-negative integer, which we
consider to be the hash value of the given message.
The size of input messages is fixed and always equals 64 bytes. Implement an
appropriate attack to check if the hash function ds_hash is strong collision
resistant. Your alphabet should include all lower-case and upper-case letters
of the English alphabet and all numbers from 0 to 9.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def ds_hash(message: str) -> int:
 hash_value = 0
 for ch in message:
 hash_value = (hash_value * 71) + ord(ch)

 return hash_value & 0x7FFFFFFF
def myAttack() -> bool:
# YOUR IMPLEMENTATION
return # True or False
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
print( myAttack() )
Marking scheme: This task's weight is 35% for providing a valid attack and
commenting on your code.
TASK 2
--------
Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
available at the following link: https://www.rfc-editor.org/rfc/rfc2104
Below is the extract from the RFC that describes how the HMAC can be
implemented, and this is what you need to implement. The text is amended to
provide specific information about the selected H cryptographic hash
function, i.e., SHA256.
 The definition of HMAC requires a cryptographic hash function, which
 we denote by H, and a secret key K. In your implementation, assume H
 to be the SHA256 cryptographic hash function.
 We denote by B the byte-length of such blocks (B=64 for SHA256),
 and by L the byte-length of hash outputs (L=** for SHA256).
 The authentication key K can be of any length up to B, the
 block length of the hash function. Applications that use keys longer
 than B bytes will first hash the key using H and then use the
 resultant L byte string as the actual key to HMAC. In any case the
 minimal recommended length for K is L bytes (as the hash output
 length).
 We define two fixed and different strings ipad and opad as follows
 (the 'i' and 'o' are mnemonics for inner and outer):
 ipad = the byte 0x36 repeated B times
opad = the byte 0x5C repeated B times.
 To compute HMAC over the data `text' we perform
 H(K XOR opad, H(K XOR ipad, text))
 Namely,
 (1) append zeros to the end of K to create a B byte string
 (e.g., if K is of length 20 bytes and B=64, then K will be
 appended with 44 zero bytes 0x00)
 (2) XOR (bitwise exclusive-OR) the B byte string computed in step
 (1) with ipad
 (3) append the stream of data 'text' to the B byte string resulting
 from step (2)
 (4) apply H to the stream generated in step (3)
 (5) XOR (bitwise exclusive-OR) the B byte string computed in
 step (1) with opad
 (6) append the H result from step (4) to the B byte string
 resulting from step (5)
 (7) apply H to the stream generated in step (6) and output
 the result
The function's name has to be CustomHMAC and defined as follows.
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomHMAC(key: bytes, text: str) -> str:
# YOUR IMPLEMENTATION
return # YOUR RESULT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 k = os.urandom(16) # k is <class 'bytes'>
 txt = "hello world!!!!" # txt is <class 'str'>

 print( CustomHMAC(k, txt) )
 # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

You can debug your code against the result from the following function:
from cryptography.hazmat.primitives import hashes, hmac
def HMAC_from_Cryptography(key: bytes, text: str) -> str:
 h = hmac.HMAC(key, hashes.SHA256())
 h.update(text.encode())
 signature = h.finalize().hex()

 return signature
Marking scheme: This task's weight is 40%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
TASK 3
--------
Using the AES-ECB encryptor from the cryptography.io module, implement the
AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
modes
key = # SELECT AN APPROPRIATE KEY FOR AES
cipher = Cipher(algorithms.AES(key), modes.ECB())
encryptor = cipher.encryptor()
Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
The function's name has to be CustomAESmode and defined as follows:
# -- START OF YOUR CODERUNNER SUBMISSION CODE
# INCLUDE ALL YOUR IMPORTS HERE
def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
# YOUR IMPLEMENTATION
return # THE CIPHERTEXT
# -- END OF YOUR CODERUNNER SUBMISSION CODE
#You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
as follows:
# MAIN
if __name__ == "__main__":
 key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
 iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
 txt = "This is a text"

 print( CustomAESMode(key, iv, txt) )
 # The result using the above input should be:
1827bfc04f1a455eb101b943c44afc1d
Marking scheme: This task's weight is 25%, which will be allocated equally
for correctly implementing the steps and commenting on your code.
如有需要,請加QQ:99515681 或WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:代做CA3 Group程序、Java編程設(shè)計代寫
  • 下一篇:CS170程序代做、Python編程設(shè)計代寫
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務+熱設(shè)計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復古美學與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                男男视频亚洲欧美| 欧美不卡一区二区三区| 日本美女一区二区| 国产一区二区三区久久悠悠色av| 国产日韩三级在线| 3d成人动漫网站| 国产精品久久久久久久岛一牛影视| 91丝袜美腿高跟国产极品老师 | 91视频xxxx| 欧美一级理论片| 91一区一区三区| 91美女在线看| 久久91精品国产91久久小草| 国产成人丝袜美腿| 91精品国产黑色紧身裤美女| 久久久777精品电影网影网| 日本精品一级二级| 成人理论电影网| 亚洲欧美国产高清| 久久久久青草大香线综合精品| 日韩一区二区三区精品视频| 日韩一区二区视频| 欧美视频在线一区二区三区| 色综合天天在线| 精品国产乱码久久久久久牛牛 | 国内精品国产三级国产a久久| 日韩高清在线观看| 青青草国产精品97视觉盛宴| 欧美日韩一区不卡| 亚洲精品国产成人久久av盗摄| 成人性生交大片免费| 亚洲国产欧美在线| 制服视频三区第一页精品| 久草热8精品视频在线观看| 肉丝袜脚交视频一区二区| 亚洲一区二区美女| 国产日韩欧美精品电影三级在线| 欧美一级日韩一级| 亚洲成在人线在线播放| 中文字幕一区二区三区不卡在线| 成人丝袜视频网| 高清在线成人网| 免费观看成人鲁鲁鲁鲁鲁视频| 中文在线一区二区| 国产精品天美传媒| 国产午夜亚洲精品理论片色戒| 一本色道综合亚洲| 99久久综合狠狠综合久久| 日韩欧美一级在线播放| 丝袜美腿亚洲色图| 成人开心网精品视频| 亚洲超碰97人人做人人爱| 亚洲一区在线视频| 亚洲成av人影院在线观看网| 国产在线一区观看| 日韩欧美国产一二三区| 国产亲近乱来精品视频| 国产精品私人自拍| 3d成人动漫网站| 日韩免费看的电影| 在线免费观看日本一区| 欧美在线高清视频| 欧美久久一二区| 久久品道一品道久久精品| 最新中文字幕一区二区三区| 91精品国产入口| 国产日韩欧美在线一区| 日韩精品一区二| 亚洲欧美一区二区视频| 婷婷开心久久网| 裸体一区二区三区| 91在线免费视频观看| 波多野结衣在线aⅴ中文字幕不卡| 一区二区三区视频在线观看| 久久99精品国产麻豆婷婷洗澡| 成人avav影音| 欧美精品久久一区二区三区| 久久久久久9999| 最新中文字幕一区二区三区| 久久精品999| 92国产精品观看| 日韩一区二区精品葵司在线| 日本一区二区动态图| 五月婷婷久久丁香| 国产精品中文有码| 色婷婷久久久综合中文字幕| 欧美猛男男办公室激情| 精品国产乱码久久久久久老虎| 国产精品久久久久影院老司| 日本麻豆一区二区三区视频| 成人小视频免费在线观看| 韩国v欧美v亚洲v日本v| 欧美日韩中文字幕一区二区| 中文字幕中文字幕一区二区| 日韩欧美美女一区二区三区| 中文字幕日本不卡| 综合激情网...| 精品蜜桃在线看| 久久久久久影视| 久热成人在线视频| 日韩免费视频一区二区| 亚洲美女淫视频| 69堂亚洲精品首页| 亚洲欧美视频在线观看| 久久精品99久久久| caoporen国产精品视频| 男女男精品视频| 一区二区三区在线观看欧美| 这里是久久伊人| 国产一区在线看| 欧美成人艳星乳罩| 久久众筹精品私拍模特| 日韩精品一区二区在线| 精品国产免费人成电影在线观看四季 | 国产在线精品免费| 日日夜夜精品视频天天综合网| 日韩国产高清在线| 夜夜嗨av一区二区三区四季av| 精品国产污污免费网站入口| 夜夜嗨av一区二区三区网页 | 日韩女同互慰一区二区| 午夜激情久久久| 欧美亚一区二区| 亚洲欧美国产77777| 秋霞午夜鲁丝一区二区老狼| 国产成人在线视频网站| 欧美日韩国产经典色站一区二区三区| 一二三四区精品视频| 麻豆freexxxx性91精品| 蜜臀久久久99精品久久久久久| 在线观看91精品国产麻豆| 亚洲国产综合人成综合网站| 国产午夜久久久久| 51精品国自产在线| 天天综合日日夜夜精品| 欧美精品乱码久久久久久 | 日韩一区精品字幕| 日韩一区二区三区免费看 | 日韩欧美国产wwwww| 亚洲高清在线视频| 日韩欧美你懂的| 美脚の诱脚舐め脚责91| 91丨九色丨黑人外教| 亚洲成人黄色小说| 538在线一区二区精品国产| 激情小说欧美图片| 美日韩一级片在线观看| 色综合亚洲欧洲| 亚洲欧美一区二区三区国产精品| 在线观看一区日韩| 亚洲chinese男男1069| 日韩你懂的在线播放| 成人综合婷婷国产精品久久免费| 国产女人水真多18毛片18精品视频| 99re8在线精品视频免费播放| 久久综合九色欧美综合狠狠| 日韩一区二区三区视频在线| 精品一区二区三区欧美| 欧美xxxx老人做受| 在线看国产一区二区| 亚洲成人tv网| 国产精品一区二区免费不卡| 亚洲精品国产成人久久av盗摄| 制服丝袜在线91| 97久久超碰精品国产| 五月激情丁香一区二区三区| 日韩无一区二区| 亚洲人成在线播放网站岛国| 欧美精品一卡两卡| 免费日本视频一区| 毛片av一区二区| 国产丝袜欧美中文另类| 欧美精品aⅴ在线视频| 成人永久看片免费视频天堂| 国产精品无码永久免费888| 日韩视频在线永久播放| 色哟哟一区二区在线观看| 国产精品成人网| 国产偷国产偷精品高清尤物| 欧美亚一区二区| 精品国产乱码久久久久久牛牛| 97超碰欧美中文字幕| 亚洲午夜免费电影| 精品国产网站在线观看| 欧美吻胸吃奶大尺度电影| 国产一区二区三区四区五区入口| 日本三级亚洲精品| 欧美日本韩国一区| 欧美肥妇bbw| 欧美日韩精品一区视频| 成人ar影院免费观看视频| 国产精品一区二区三区四区| 久久免费美女视频| 亚洲天堂2014| 在线视频欧美区| 成人av网址在线观看| 亚洲主播在线播放| 国产精品久久久久久久久久免费看 | 热久久免费视频| 亚洲色图视频网站|